Message ID | 20230921080146.37186-1-gongwei833x@gmail.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:172:b0:3f2:4152:657d with SMTP id h50csp5191334vqi; Thu, 21 Sep 2023 15:59:04 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFVlQTP4+G8TkjKXhc7cDARe2ikWRVVxW3dmhKVC9tOQv9qQiBxdH3eImmIhjYflETiNvoX X-Received: by 2002:a17:903:187:b0:1bf:34fb:3085 with SMTP id z7-20020a170903018700b001bf34fb3085mr8056686plg.14.1695337143711; Thu, 21 Sep 2023 15:59:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695337143; cv=none; d=google.com; s=arc-20160816; b=U6f/qrT/X2EhC3GIwahM2BGttLkZuxFmVaZl2k8Z7dxKtnTSgODeoRWvKCyXXyEt6D lUeeF0CJnk2NdHPzKyK8ZFiAJzHMcNGLIVlWml0sOw3RRhi5Prm/6TjaxQjKEqRmKsrf bKCkwf5KEhbrN49vcS4ycfaQe+HCw6iI34HzpPSryVB++3AUUUxVN/2IKn3WuQJUtxOu 77B5F6k7pdUMInbaSLYDjKtUBvVG6ZKh+uU8freboYOpH1jizXcy5LYP4FPSiY7Zj5Iw 8LwB/k2RDzCOFm63b9ibgczBBo7VpydP0Atek9gGHhdglv0tk/cZcbhC0XmEsvoBV+03 SpsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ntFYzRRPH6h7NTTrU5OlfJP05uG/LpkpMCjAuag4Kkc=; fh=3U/aSPvhlJUoR5OEUNoYI9odFhnPbJnmZVfaEYVfoA0=; b=DnmF1DLJ3EEvLqkAUVL6ruL8YBqtOUHwxZnqnqRVp18Avf3MhmmHjsGjms1xuye3bW V7m1/RRNjysQER4PApWgaekXAyThn86K8BKs0xmN7I7LrsxFEZFB1ZIFRygyzxdKCVQz d0YRRsPuIvQP+kK2fDPcZ3t9d9rB/LvNCbeSRls/m+IroQYJ1tVR/kyFo1a5hE3uanf3 GPStw2Q8rIepqyCNqudB+5RRikCg2n1SqsjfhEyU5hluIt11h7/BIVxvV96Eo/zvlurP NHdjD65O96i8IDbRGxJiauTNgQQvVH2Ih4OmHKXaBBfe26if48FX2xhXLZeqK9hri1Ta kPPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=BTDhImtu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id d11-20020a170902c18b00b001c3c94d212fsi2344593pld.97.2023.09.21.15.59.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Sep 2023 15:59:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=BTDhImtu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 992A98029051; Thu, 21 Sep 2023 11:53:14 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230372AbjIUSxK (ORCPT <rfc822;ruipengqi7@gmail.com> + 28 others); Thu, 21 Sep 2023 14:53:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59358 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230228AbjIUSwt (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 21 Sep 2023 14:52:49 -0400 Received: from mail-pl1-x633.google.com (mail-pl1-x633.google.com [IPv6:2607:f8b0:4864:20::633]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5BF4F8DEDC for <linux-kernel@vger.kernel.org>; Thu, 21 Sep 2023 10:54:36 -0700 (PDT) Received: by mail-pl1-x633.google.com with SMTP id d9443c01a7336-1c1e3a4a06fso10251625ad.3 for <linux-kernel@vger.kernel.org>; Thu, 21 Sep 2023 10:54:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1695318874; x=1695923674; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=ntFYzRRPH6h7NTTrU5OlfJP05uG/LpkpMCjAuag4Kkc=; b=BTDhImtu+T1lIbYOfOgvjX2YZfyHJN7Fgg68GJuvFbhOop1OYwjm//OF0ijGv2SEts TXm6k4AijChwe0SCA3vchDb3kXSSNHUh4R//5gYprqXwFQ9trHf6/xDEIXzrq+BuqT4v v0DvXVCgX1RyM0L+10r5ivzwxpQWFkSmGxr93qWASUqpnW6QgIWH3os1l0tmSgeVw06m shsVaCnWypR5fd5S/HAnsVvGRiUC3dK4i2PoNDL7MbES38rxymcSeueG+pOFnOFjcRP7 Y6eccHYrvdb4eDq5wCtvkThnM3EihCMnYbyWwwzBZBoyh8lJd+xSAw13iz1o6hVRmRiG YeFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695318874; x=1695923674; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ntFYzRRPH6h7NTTrU5OlfJP05uG/LpkpMCjAuag4Kkc=; b=vPt7WK9Vy+9fswCzvW+KkXgMKJvCfMz5CZeoEWhSeadpFT3hSmYAV3gxPY1uku1RuY 8IUWmVrw/yQE6Xw3UVPzPrLgZGwU/ENlibfzBR+WTEDzMcGyp4k6cLvcF2AEKV51EYKe uPNFezK4MDOV/hU/3bM4C6iWoz28m1s4hE3r6voNJBbHw3yma2BJizFXuZFD+zTbNKG9 UI/mbZ/YyclJKMVLN6hhaSSObILhEmzAYjXXCsCon97QxlODKzgvjD8zcVJeKt7NObiB 2FTPhcYyIK1xbnnW4Nr4a6tnSqtzhC2Q4XiGBOq/euKr18LFArfFDsfih8W8Ul1foNNq szQw== X-Gm-Message-State: AOJu0YywizPnxv+Y4Jb6YQ3DduqqySeYvLisxRb5L+Cn/bx2gq+9lDbc xJMlObrMJbjUwVSbP7oUJwjRy+ckYuw= X-Received: by 2002:a05:6808:1820:b0:3a8:43d5:878b with SMTP id bh32-20020a056808182000b003a843d5878bmr5338958oib.2.1695283316233; Thu, 21 Sep 2023 01:01:56 -0700 (PDT) Received: from localhost.localdomain ([111.108.111.135]) by smtp.gmail.com with ESMTPSA id fm1-20020a056a002f8100b00679a4b56e41sm735214pfb.43.2023.09.21.01.01.54 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 21 Sep 2023 01:01:55 -0700 (PDT) From: Wei Gong <gongwei833x@gmail.com> To: tglx@linutronix.de Cc: linux-kernel@vger.kernel.org, Wei Gong <gongwei833x@gmail.com> Subject: [PATCH] genirq: avoid long loops in handle_edge_irq Date: Thu, 21 Sep 2023 16:01:46 +0800 Message-Id: <20230921080146.37186-1-gongwei833x@gmail.com> X-Mailer: git-send-email 2.32.1 (Apple Git-133) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 21 Sep 2023 11:53:14 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1777689840601210091 X-GMAIL-MSGID: 1777689840601210091 |
Series |
genirq: avoid long loops in handle_edge_irq
|
|
Commit Message
Wei Gong
Sept. 21, 2023, 8:01 a.m. UTC
When there are a large number of interrupts occurring on the tx
queue(irq smp_affinity=1) of the network card, changing the CPU
affinity of the tx queue (echo 2 > /proc/irq/xx/smp_affinity)
will cause handle_edge_irq to loop for a long time in the
do {} while() loop.
After setting the IRQ CPU affinity, the next interrupt will only
be activated when it arrives. Therefore, the next interrupt will
still be on CPU 0. When a new CPU affinity is activated on CPU 0,
subsequent interrupts will be processed on CPU 1.
cpu 0 cpu 1
- handle_edge_irq
- apic_ack_irq
- irq_do_set_affinity
- handle_edge_irq
- do {
- handle_irq_event
- istate &= ~IRQS_PENDIN
- IRQD_IRQ_INPROGRESS
- spin_unlock()
- spin_lock()
- istate |= IRQS_PENDIN
- handle_irq_event_percpu - mask_ack_irq()
- spin_unlock()
- spin_unlock
} while(IRQS_PENDIN &&
!irq_disable)
Therefore, when determining whether to continue looping, we add a check
to see if the current CPU belongs to the affinity table of the interrupt.
Signed-off-by: Wei Gong <gongwei833x@gmail.com>
---
kernel/irq/chip.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Comments
Hi Wei, kernel test robot noticed the following build errors: [auto build test ERROR on tip/irq/core] [also build test ERROR on linus/master v6.6-rc2 next-20230921] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Wei-Gong/genirq-avoid-long-loops-in-handle_edge_irq/20230922-025437 base: tip/irq/core patch link: https://lore.kernel.org/r/20230921080146.37186-1-gongwei833x%40gmail.com patch subject: [PATCH] genirq: avoid long loops in handle_edge_irq config: um-allnoconfig (https://download.01.org/0day-ci/archive/20230923/202309230859.ygo4QTtO-lkp@intel.com/config) compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20230923/202309230859.ygo4QTtO-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202309230859.ygo4QTtO-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from kernel/irq/chip.c:11: In file included from include/linux/irq.h:20: In file included from include/linux/io.h:13: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:547:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 547 | val = __raw_readb(PCI_IOBASE + addr); | ~~~~~~~~~~ ^ include/asm-generic/io.h:560:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 560 | val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr)); | ~~~~~~~~~~ ^ include/uapi/linux/byteorder/little_endian.h:37:51: note: expanded from macro '__le16_to_cpu' 37 | #define __le16_to_cpu(x) ((__force __u16)(__le16)(x)) | ^ In file included from kernel/irq/chip.c:11: In file included from include/linux/irq.h:20: In file included from include/linux/io.h:13: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:573:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 573 | val = __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr)); | ~~~~~~~~~~ ^ include/uapi/linux/byteorder/little_endian.h:35:51: note: expanded from macro '__le32_to_cpu' 35 | #define __le32_to_cpu(x) ((__force __u32)(__le32)(x)) | ^ In file included from kernel/irq/chip.c:11: In file included from include/linux/irq.h:20: In file included from include/linux/io.h:13: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:584:33: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 584 | __raw_writeb(value, PCI_IOBASE + addr); | ~~~~~~~~~~ ^ include/asm-generic/io.h:594:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 594 | __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr); | ~~~~~~~~~~ ^ include/asm-generic/io.h:604:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 604 | __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr); | ~~~~~~~~~~ ^ include/asm-generic/io.h:692:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 692 | readsb(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ include/asm-generic/io.h:700:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 700 | readsw(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ include/asm-generic/io.h:708:20: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 708 | readsl(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ include/asm-generic/io.h:717:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 717 | writesb(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ include/asm-generic/io.h:726:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 726 | writesw(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ include/asm-generic/io.h:735:21: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 735 | writesl(PCI_IOBASE + addr, buffer, count); | ~~~~~~~~~~ ^ >> kernel/irq/chip.c:835:63: error: no member named 'affinity' in 'struct irq_common_data' 835 | cpumask_test_cpu(smp_processor_id(), desc->irq_common_data.affinity)); | ~~~~~~~~~~~~~~~~~~~~~ ^ 12 warnings and 1 error generated. vim +835 kernel/irq/chip.c 771 772 /** 773 * handle_edge_irq - edge type IRQ handler 774 * @desc: the interrupt description structure for this irq 775 * 776 * Interrupt occurs on the falling and/or rising edge of a hardware 777 * signal. The occurrence is latched into the irq controller hardware 778 * and must be acked in order to be reenabled. After the ack another 779 * interrupt can happen on the same source even before the first one 780 * is handled by the associated event handler. If this happens it 781 * might be necessary to disable (mask) the interrupt depending on the 782 * controller hardware. This requires to reenable the interrupt inside 783 * of the loop which handles the interrupts which have arrived while 784 * the handler was running. If all pending interrupts are handled, the 785 * loop is left. 786 */ 787 void handle_edge_irq(struct irq_desc *desc) 788 { 789 raw_spin_lock(&desc->lock); 790 791 desc->istate &= ~(IRQS_REPLAY | IRQS_WAITING); 792 793 if (!irq_may_run(desc)) { 794 desc->istate |= IRQS_PENDING; 795 mask_ack_irq(desc); 796 goto out_unlock; 797 } 798 799 /* 800 * If its disabled or no action available then mask it and get 801 * out of here. 802 */ 803 if (irqd_irq_disabled(&desc->irq_data) || !desc->action) { 804 desc->istate |= IRQS_PENDING; 805 mask_ack_irq(desc); 806 goto out_unlock; 807 } 808 809 kstat_incr_irqs_this_cpu(desc); 810 811 /* Start handling the irq */ 812 desc->irq_data.chip->irq_ack(&desc->irq_data); 813 814 do { 815 if (unlikely(!desc->action)) { 816 mask_irq(desc); 817 goto out_unlock; 818 } 819 820 /* 821 * When another irq arrived while we were handling 822 * one, we could have masked the irq. 823 * Reenable it, if it was not disabled in meantime. 824 */ 825 if (unlikely(desc->istate & IRQS_PENDING)) { 826 if (!irqd_irq_disabled(&desc->irq_data) && 827 irqd_irq_masked(&desc->irq_data)) 828 unmask_irq(desc); 829 } 830 831 handle_irq_event(desc); 832 833 } while ((desc->istate & IRQS_PENDING) && 834 !irqd_irq_disabled(&desc->irq_data) && > 835 cpumask_test_cpu(smp_processor_id(), desc->irq_common_data.affinity)); 836 837 out_unlock: 838 raw_spin_unlock(&desc->lock); 839 } 840 EXPORT_SYMBOL(handle_edge_irq); 841
diff --git a/kernel/irq/chip.c b/kernel/irq/chip.c index dc94e0bf2c94..cafd395367c3 100644 --- a/kernel/irq/chip.c +++ b/kernel/irq/chip.c @@ -831,7 +831,8 @@ void handle_edge_irq(struct irq_desc *desc) handle_irq_event(desc); } while ((desc->istate & IRQS_PENDING) && - !irqd_irq_disabled(&desc->irq_data)); + !irqd_irq_disabled(&desc->irq_data) && + cpumask_test_cpu(smp_processor_id(), desc->irq_common_data.affinity)); out_unlock: raw_spin_unlock(&desc->lock);